Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 01:00

General

  • Target

    b5bf4d51d3c605d19def296073c4816bb5185e37c396d5269157347c4477e6d0.exe

  • Size

    41KB

  • MD5

    84d27a2fdd5af86ddb930eea28d85f9a

  • SHA1

    90f5fcad8e82af1d32299faee6903eb95bd321ea

  • SHA256

    b5bf4d51d3c605d19def296073c4816bb5185e37c396d5269157347c4477e6d0

  • SHA512

    b00c8763fc88284585980f0c44073d1967d6d668b9cceefca6da76978c794ed7b2081c0519c6117ff79a889e987fd0af93efd3fd284af3b43f02b532a9e0e745

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0m+s2BGUGEgZg0hI44ec:CTW7JJZENTNyl2Sm0mKRgZg0C44enYE0

Malware Config

Signatures

  • Renames multiple (5128) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5bf4d51d3c605d19def296073c4816bb5185e37c396d5269157347c4477e6d0.exe
    "C:\Users\Admin\AppData\Local\Temp\b5bf4d51d3c605d19def296073c4816bb5185e37c396d5269157347c4477e6d0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    5a8889e53a7377fa9347460bb7730e38

    SHA1

    acd32fedd7be813124f22720ea7dd2eafedf2283

    SHA256

    81709f5c8bd0b7865e9c71ab44736051d49a3ef3933c8270e6b0eee285731b20

    SHA512

    9c29036a594dcc7525c1cec1d17326c69dd501be0dffd0997982aec2f88b19de90a8ceba248358a21bfb7086f5192823ddf35d326b390c5ef41c6ba1d87c2208

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    140KB

    MD5

    b1c1c44eb6ebca3600e325f6e2a197fd

    SHA1

    94ea5734283e78faf368f5fd007f4dceff3dbcc4

    SHA256

    d59f8ca82cce4a3ad3e2965573074a995cf9f7d92f81c23ed88bb3b574ca2682

    SHA512

    ff3eca466b34be45125067477679821d3ac06b6d5866169e7e434d1b91a4660769b91ec16aa65a9aa36731aae74edbf5403ca7f36ab400012c8c013665013596

  • memory/3680-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3680-889-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB